CYSE 301

In-Progress Spring 2026


Cybersecurity Techniques and Operations

Provides hands-on training in real-world cyber operations and defensive security techniques. The course emphasizes practical cybersecurity tools, vulnerability analysis, penetration testing, and network defense within a controlled lab environment.

Students engage directly with traffic tracing, firewall configuration, network scanning, exploitation frameworks, password cracking techniques, wireless security analysis, and digital steganography. The course bridges foundational networking knowledge with applied offensive and defensive security operations.

Through structured labs and applied exercises, CYSE 301 develops operational competency in identifying, analyzing, and mitigating vulnerabilities across modern computing environments.

Key Skills & Topics

Network Traffic Analysis

  • Packet inspection using Wireshark and tshark
  • Traffic tracing and network behavior analysis
  • Identification of suspicious activity in network environments

Vulnerability Scanning & Defense

  • Network scanning with Nmap
  • Firewall configuration using pfSense
  • Evaluation of system vulnerabilities
  • Implementation of defensive countermeasures

Penetration Testing & Exploitation

  • Introduction to ethical hacking methodologies
  • Metasploit Framework usage
  • Attack vector enumeration
  • Controlled exploitation techniques

Authentication & Password Security

  • Password storage mechanisms
  • Password cracking techniques
  • Wi-Fi security vulnerabilities
  • Wireless traffic decryption methods

Applied Cryptography & Steganography

  • Cryptographic tools and protocol fundamentals
  • Exploitation of weak implementations
  • Digital steganography using s-tool and steghide

Course Material


Sword vs. Shield: Network Scanning and Firewall Security

Assignment3_Sword_vs_Shield_EC_fd_3_4


Traffic Tracing & Network Packet Analysis

CYSE301_Week2_HW_fd_Batch-Compress